On Mon, Feb 13, 2012 at 1:49 PM, Steve Bennett <ste...@workware.net.au>wrote:

> Joe Mistachkin has recently added support for calling TH1 scripts on
> certain actions.
> See http://www.fossil-scm.org/index.html/info/0b61e3c019
>
> In the jimtcl branch, TH1 is replaced with Jim Tcl, so any of these
> scripts has the full power of Jim Tcl, including exec.
>
>
This sounds a whole lot like mobile code. I was left wondering: would it be
enough to do a 'fossil clone <something>' to download a malware script
onto my system? How is this capability secured?

-- 
Gé
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to